I hereby claim:
- I am cameronhotchkies on github.
- I am chotchkies (https://keybase.io/chotchkies) on keybase.
- I have a public key ASBwcIFwwOHKaDwzi20fYJ7PyirAdi_mBRv7dplUaEzbWAo
To claim this, I am signing this object:
from http.server import BaseHTTPRequestHandler | |
import socketserver | |
import time | |
PORT = 9000 | |
class SinkHandler(BaseHTTPRequestHandler): | |
def do_POST(self): | |
incoming = self.rfile |
Wed Jul 1 03:58:54 UTC 2020 |
#!/usr/bin/env python3 | |
import urllib.request | |
import urllib.parse | |
import json | |
api_key = 'demo' | |
ticker = 'MSFT' |
I hereby claim:
To claim this, I am signing this object:
def happySequence[A](source: Seq[Future[A]]) = { | |
val optioned = source.map { f => | |
f.map(Option.apply).recover { | |
case _ => None | |
} | |
} | |
Future.sequence(optioned).map(_.flatten) |
import org.joda.time.DateTime | |
import play.api.db.slick.DatabaseConfigProvider | |
import slick.driver.JdbcProfile | |
import play.api.Play.current | |
object SlickMapping { | |
protected val dbConfig = DatabaseConfigProvider.get[JdbcProfile](current) | |
import dbConfig._ | |
import dbConfig.driver.api._ |
import play.api.db.slick.Config.driver.simple._ | |
import org.joda.time.DateTime | |
import java.sql.Timestamp | |
object SlickMapping { | |
implicit def jodaDateTimeMapping = | |
MappedColumnType.base[DateTime, Timestamp]( | |
dt => new Timestamp(dt.getMillis), | |
ts => new DateTime(ts.getTime)) | |
} |
package com.semisafe.cryptopals | |
/* | |
* Implementation of MD4 in pure Scala | |
* | |
* derived from the RSA Data Security, Inc. MD4 | |
* Message-Digest Algorithm (http://tools.ietf.org/html/rfc1320) | |
* | |
* This was implemented as part of the Matasano Crypto Challenges | |
* http://www.matasano.com/articles/crypto-challenges/ |
package com.semisafe.cryptopals | |
/* | |
* Implementation of SHA-1 in pure Scala | |
* | |
* This was implemented as part of the Matasano Crypto Challenges | |
* http://www.matasano.com/articles/crypto-challenges/ | |
* | |
* Having a native implementation of SHA-1 is required for the | |
* fourth set of challenges, building your own isn't, so feel |